Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-33193

Опубликовано: 05 авг. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

A NULL pointer dereference was found in Apache httpd mod_h2. The highest threat from this flaw is to system integrity.

Меры по смягчению последствий

This flaw can be mitigated by disabling HTTP/2. More information available at: https://httpd.apache.org/docs/2.4/mod/mod_http2.html

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat Enterprise Linux 7httpdOut of support scope
Red Hat Enterprise Linux 9httpdNot affected
Red Hat JBoss Enterprise Application Platform 6httpd22Not affected
Red Hat JBoss Enterprise Web Server 2httpd22Not affected
JBoss Core Services for RHEL 8jbcs-httpd24-httpdFixedRHSA-2022:714326.10.2022
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2022:714326.10.2022
Red Hat Enterprise Linux 8httpdFixedRHSA-2022:191510.05.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7httpd24-httpdFixedRHSA-2022:675329.09.2022
Text-Only JBCShttpdFixedRHSA-2022:714426.10.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1966728httpd: Request splitting via HTTP/2 method injection and mod_proxy

EPSS

Процентиль: 76%
0.01033
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 4 года назад

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

CVSS3: 7.5
nvd
почти 4 года назад

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

CVSS3: 7.5
debian
почти 4 года назад

A crafted method sent through HTTP/2 will bypass validation and be for ...

suse-cvrf
почти 4 года назад

Security update for apache2

suse-cvrf
почти 4 года назад

Security update for apache2

EPSS

Процентиль: 76%
0.01033
Низкий

7.5 High

CVSS3